Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0365 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2020-12-10 | ÃÑÆäÀÌÁö | 18 |
ÇѱÛÇ¥Áظí | Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) º¸¾È ¿ä±¸ »çÇ× | ||
¿µ¹®Ç¥Áظí | Security requirements of hardware security module (HSM) for V2X communication | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. 5Àý¿¡¼´Â Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀ» ¼³¸íÇÏ°í, 6Àý¿¡¼´Â Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ÀÚ»ê°ú Àڻ꿡 ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í, º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ÆľÇÇÒ ¼ö ÀÖ´Â ´ëÀÀ Ç¥¸¦ Á¦°øÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard defines the security requirements to protect the security assets of the hardware security module for V2X communication from threats. Section 5 describes the hardware security module for V2X communication, and Section 6 identifies the security assets and threats to the hardware security module and defines the security requirements. It also provides a mapping table to understand the relationship between cybersecurity threats and security requirements quickly. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0365.pdf |